Following the presentation that I made at the RMLL 2014 last week, I slightly changed my malware analysis setup. The goal is to make it fully operational “offline“. Indeed, today we are always “on“, Internet is everywhere and it’s easy to get a pipe. However, sometimes it’s better to not send packets to the wild Internet, even more when playing with malwares. We can be connected to a network with restricted access and some “exotic” ports won’t be authorized (ex: IRC). By allowing malicious code to connect to the world, we could trigger some firewalls, IDS or IPS if working in a corporate environment. If the malware is targeting a specific company or country, it can be suspicious to flood the C&C or any other resource with suspicious traffic (in this case, we are suspicious for the attacker). In short, “to live happy, live hidden”
I’m just back from Montpellier where was organised the 2014’s edition of the RMLL (“Rencontres Modiales des Logiciels Libres”) or LSM in English (“Libre Software Meeting”). This is a huge event similar to the FOSDEM in Brussels where people who love free software exchange views, researches and make some networking. The event location changes every year and this edition was organised in the south of France… not a bad place! The event is huge and is organized across a whole week, attracting a few hundreds of people. Within the main event, other small events are organised and talks are divided in multiple topics like:
And we are back to the Disneyland conference centre for the second day of Hack in Paris… It looks that the night was very short for many people (who hacked all night long?) because the planning started with a delay!
Today started the 2014 edition of Hack in Paris, a French security conference held in Disneyland Resort Paris – a very nice place for such kind of event! The conference started with a sunny sky over the conference centre in the New York hotel. I arrived just in time to register and to grab some coffee. Here is my wrap-up for the first day. Happy reading!
And here is the second day wrap-up. The day started with a sunny sky over Amsterdam. After a breakfast and a chat with the Help Net Security team, we moved to the rooms. Like yesterday, the main stage is dedicated to women for two keynotes. The first one should be Pamelo Fusco with her keynote title: “Behind the Crosswire” but she never arrived… No news from the speaker, maybe lost in the Amsterdam night life?
I’m in Amsterdam for the next two days to attend the new edition of Hack In The Box. This is a special edition with many improvements. First, it’s the fifth edition (already!) and the location changed to “De Beurs van Berlage”, a very nice place in the center of the city. Second, the normal conference is also held alongside with HITB Haxpo, a technology and security expo for hackers and geeks. This expo is open to everyone for free. Due to a holiday in Belgium and Holland, I joined Amsterdam smoothly without any traffic jam and was in time to grab my badge, some coffee and some 802.11x packets before the talks.
If we can put the business and some fun together, so why the hesitation? For a while, I’m playing with flying toys. I already played with different models of RC helicopters and recently, I switched to another category: I bought a quadcopter. The idea to mix the technology of drones with WiFi audits popped up in my mind for a while. First of all, this is not something news. Darren from Hak5 had the same crazy idea before me (see the episode 1520). But there is a difference between watching a cool video and doing the same in real life. Thus, I decided to experiment the same! And if I could use it to perform WiFi assessments or pentest, it’s even more cool!
With a little delay, here is my wrap-up of the last OWASP Belgium chapter meeting. It was held at NVISO, an information security company located in Brussels which is known for its ApkScan tool. After some pizzas, drinks and chats with peers, two speakers came on stage. Amongst known faces, a lot of new people were present. That’s good to have fresh blood in such events!
The first speaker was Tiago Teles from Cigital. The title of his presentation was “Securing password storage – Increasing resistance to brute force attacks“. Passwords… a hot topic. Indeed, yesterday, eBay announced to have suffered of a data leak of users data. Passwords are in the wild now. Tiago explained how to handle properly the password of your users and started with a fact:
“Your passwords WILL be extracted from your system”
Thus, we have to make them unusable or at least make the attackers’ job more difficult. Modenr websites allow users to register and use credentials to buy stuff, to access private data, to organize their profile, etc. You’re responsible of those passwords and must protect them in the right way. After a review of the history of protections (do you remember the old /etc/passwd UNIX files with passwords hashed and stored in it, readable for everyone?) and the challenges we are facing, Tiago gave very interesting suggestions to protect the passwords against brute-force attacks. Hashing (with salt!) is a best practice. Why?
- They are unique
- They are resistant to collision
- They can’t be reversed
- They can’t be predicted
- They are… fast!
A technique to attack hashed passwords is to use rainbow tables but they also have limitations. To protect against brute force attack, Tiago explained what are adaptive hashes. They are designed to remove one of the properties of classic hashes: speed! Finally, Tiago give a very good advice to everybody: Be prepared to be attacked and to have a good communication plan! The slides are available here.
After a short break, the second talk was given by Daan Raman and Erik Van Buggenhout (from NVISO). The title was “A history of ATM violence – From blowing up safes over jackpotting to all-round malware“. ATM’s or “Automated Teller Machine” are used daily by most of us and are often nice targets for thieves. As said Erik: “We don’t need to ask why to target them! That’s were the money is…“. After a short history of ATM’s (did you know that they are currently 2.2 millions ATM’s worldwide?), Erik described the standard layout of a modern ATM. It is based on two main parts: the safe itself containing the money and a computer. The safe is usually quite well protected but the computer is vulnerable in many points. To learn how ATM’s work, Erik just bought its own and made some research! Computers used in ATM’s are classic computers with all the required I/O: USB ports, keyboard, mouse, CD player etc… Even if some physical attacks were reviewed with funny pictures, Erik & Daan focused on attacking the ATM via the built-in computer (which remains based on Windows XP in most cases). How?
ATM systems are based on a unique set of APIs that are developed by CEN/XFS (“eXtensions for Financial Services“). They allow to operated with the ATM devices like:
- Cash dispensers
- Identification card units
- Personal identification number keypads (PIN)
- Text terminal units
Like any API, there are two layers: vendor dependent and vendor independent. Using this API and some C code, Erik wrote a PoC tool called “ATMDispenser.exe” which can perform cash-out operations! To demonstrate the tool, a live funny demo was performed using Erik’s ATM fullfilled with fake banknotes. Of course, to install the malicious code, a physical access is required to the ATM but many people have access to it (maintenance team, cleaning teams). Sometimes the ATM is located in a public area. Funny note again, some computers are protected in the ATM rack with a lock and a key. This key looks to be the same for all ATMs and the lock has been opened by Erik in 10 mins using standard lock-picking tools. Nice presentation! The slides are available here.
In a previous post, I spoke about the importance of the “context” during a pentest. In a recent project, I faced a situation similar to airplane crashes. Let me explain this… Despites the fact that the crash of an airplane results sometimes in a huge amount of deaths once, airplaines can be considered as safe. Statistically, flying is less dangerous than driving to the airport with your car! Modern airplanes are very reliable: they all have multiple engines but they are designed to be able to fly with one of them being out-of-service. The cabine crew is also trained to fly in such conditions. Airplanes are also under maintenance regularly and inspected from A to Z.
Warning! In a few weeks, hackers will be back in Disney Land Resort Paris for two events: Hack in Paris and La Nuit du Hack! I should be present to both events to do some live coverage and write wrap-up’s. The two agenda have been published (here & here). In the mean time, the organizers kindly give me some gifts for my readers!
The first event is a classic two-days security conference with top international speakers like Winn Schwartau, Jayson E. Street (as keynote speakers), Sebastien Andrivet or Francis Alexander. The second one is organized during the weekend following the classic conference and is more “funny” with talks, workshops, challenges and a big party. A very long night!